2 Antworten
- Neueste
- Die meisten Stimmen
- Die meisten Kommentare
0
Make sure that the IAM role associated with your API Gateway has permissions to write to CloudWatch Logs (e.g., the logs:CreateLogGroup, logs:CreateLogStream, and logs:PutLogEvents actions
0
Thanks, When I check through IAM, I see that I have the necessary permissions. Logs are below. Only principalId field always "-".
{
"requestId": "U_wSVhG4l*******",
"ip": "85.***.**.**",
"requestTime": "21/Mar/2024:20:09:50 +0000",
"httpMethod": "GET",
"routeKey": "ANY /{proxy+}",
"status": "200",
"protocol": "HTTP/1.1",
"responseLength": "87",
"path": "/***/***/***",
"reqLatency": "107 ms",
"resLatency": "109 ms",
"userAgent": "***",
"principalId": "-"
}
beantwortet vor 2 Monaten
Relevanter Inhalt
- AWS OFFICIALAktualisiert vor 2 Jahren
- AWS OFFICIALAktualisiert vor einem Jahr
- Wie aktiviere ich CloudWatch Logs zur Fehlerbehebung meiner API-Gateway-REST-API oder WebSocket-API?AWS OFFICIALAktualisiert vor 2 Jahren
- AWS OFFICIALAktualisiert vor 3 Jahren